Week 50 in Review – 2010

DojoCon Follow-Up – novainfosecportal.com
Although there was a formal CFP, everything else followed a traditional unconference format.

SANS SEC660: Post Mortem – c22.cc
The class is designed to cover the ground between the SEC560 Network Penetration Testing class and the SEC709/710 that Stephen Sims has been running for a while now (Exploit development).

Resources:

Will it Blend? – xs-sniper.com
I’m always humbled when I learn of what others are doing in the security community and even more humbled when asked to present.

DOJOCON 2010 Videos – irongeek.com
Below are the videos from the conference, at least the ones I can show :), enjoy.

Websecurify 0.8Alpha4 – code.google.com/p/websecurify/
Websecurify is a powerful web application security testing platform designed from the ground up to provide the best combination of automatic and manual vulnerability testing technologies.

All about Heaplocker
HeapLocker allows you to set a maximum to the amount of private virtual memory a process is using. If the maximum is exceeded, HeapLocker will suspend the process and inform the user.

pwnshell – a better jsp shell – i8jesus.com
The world needs a JSP shell that really helps a blackbox attacker pivot to important assets, so I took a stab at it. It’s called quite lamely called pwnshell.

Capturing Windows Logons with Smartlocker – metasploit.com
One of the most effective ways to capture the clear-text user password from a compromised Windows machine is through the “keylogrecorder” Meterpreter script.

Watch out for exim! – skullsecurity.org
My strategy was to keep running ‘make’ and fixing what it complained about until it shut up and compiled.

Conducting a Phishing Campaign in Metasploit Pro – carnal0wnage.attackresearch.com
Only gripe is the lack of configuration ability in the exploit payload section. I’ve been told this will be addressed shortly even though a lot of work has been put into smart defaults the ability to change it when necessary would be nice.

You probably missed it but jduck recently snuck in a VNC mixin and vnc_login module to the trunk.

Vulnerabilities:

Ouch! HP Storage Device Admin Credentials Hardcoded, Security Experts Facepalm
Hewlett Packard said in a statement that it has identified a “potential security issue” with one of its storage area networking (SAN) products and is readying a fix for the issue.

Over 500 patches for SAP – h-online.com
On Tuesday, SAP – one of the largest manufacturers of business applications and enterprise software – released a huge number of so-called Security Notes.

Other News:

Gawker hacked linked to Acai berry spam in Twitter
Over the weekend, up to 1.3 million passwords were stolen off of Gawker’s servers by a hacker group called Gnosis and then publicly shared on torrent site The Pirate Bay, for anyone and everyone to download.

Major Ad Networks Found Serving Malicious Ads – threatpost.com
Two major online ad networks–DoubleClick and MSN–were serving malware via drive-by download exploits over the last week, experts say, after a group of attackers was able to trick the networks into displaying their ads by impersonating an online advertising provider.

Jailbreaks, iPhone, iPad, and MDM – intrepidusgroup.com
This article will start with device security and gradually focus outward to a discussion on MDM. Today we will also make some comments on the thorny issue of jailbroken iOS devices.

The Internet Goes to War – arbornetworks.com
In general, getting accurate data about Internet attacks can be a challenge. Namely, a) companies avoid publicly discussing most attacks and b) the attacks can be difficult to measure or at least consistently compare.

NSA considers its networks compromised – net-security.org
The problem with cyber defense – especially when it comes to attacks backed by governments and intelligence organizations – is that attackers are usually highly motivated and often very well funded.

UN mulls internet regulation options – itnews.com.au
The United Nations is considering whether to set up an inter-governmental working group to harmonise global efforts by policy makers to regulate the internet.

Why the US Government Attacking Wikileaks is a Bad Idea – zeropaid.com
Whatever your take on this hot button topic is, few would argue that this story hasn’t caught a huge amount of international attention and draws a seemingly unprecedented amount of attention to the internet.

Leave A Comment

About Us

Infosec Events is dedicated to the growing information security industry. We strive to provide useful information and resources to those in the industry. Don't hesitate to contact us should you need anything.